Certified Ethical Hacker (Voucher Included)
Are you interested in network security and information technology—but perhaps want more of a challenge than typical IT provides? If so, ethical hacking certification is a unique way to set yourself apart from other IT professionals and add even more value to your organization. As a certified ethical hacker, you'll use the same techniques as the bad guys to assess security and identify weaknesses, except you'll use these hacking powers for good.
To put it one way, "To beat a hacker, you need to...
George Mason University
What you will learn
- Assess ethical and legal requirements of security assessment and penetration testing and determine a strategy to comply with these requirements
- Analyze different phases of hacking and recommend the best ethical hacking strategy for assessing the security of various components of information system
- Examine different vulnerabilities, threats, and attacks to information systems and recommend the countermeasures
- Analyze cryptography algorithms and encryption techniques, and design implementation strategies for securing information
- Assess various network security techniques and tools to implement an appropriate level of information security controls based on evidence, information, and research
How you will benefit
- Prepare for Certified Ethical Hacker (CEH) Exam Number 312-50 with example CEH exam questions
- Obtain the CEH credential to unlock a number of career opportunities in the information security and cybersecurity industry
- Obtain a credential highly acknowledged and recognized by employers in the public and private sector
- Compete the most advanced, hands on ethical hacking program in the industry
How the course is taught
- Self-paced, online course
- 6 Months to complete
- Open enrollment, begin anytime
- 100 course hours
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Social Engineering
- Denial of Service
- Session Hijacking
- Evading IDS, Firewalls and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
Eric Reed has over 12 years of experience in IT consulting, specializing in security. Since 2005, he has consulted and delivered custom training to the U.S. military and numerous Fortune 100 and Fortune 500 companies. He has delivered CEH, CHFI, and ECSA/LPT training for the last seven years, with a 95 percent pass rating. Reed was awarded the EC Council Instructor of the Year in 2009 and 2012, as well as the Circle of Excellence in 2006, 2007, and 2010.
There are no mandatory prerequisites prior to taking this certified ethical hacker training. However, the Certified Ethical Hacker course is specifically designed to help individuals with prior strong knowledge of network infrastructure, computer hardware, software, and security prepare for the (CEH) Exam # 312-50, offered by EC-Council.
- This course can be taken on either a PC or Mac.
- PC: Windows 8 or later.
- Mac: macOS 10.10 or later.
- Browser: The latest version of Google Chrome or Mozilla Firefox are preferred. Microsoft Edge and Safari are also compatible.
- Adobe Acrobat Reader.
- Software must be installed and fully operational before the course begins.
- Email capabilities and access to a personal email account.
Instructional Material Requirements:
The instructional materials required for this course are included in enrollment. The following textbook will be shipped to you approximately 7-10 business days after enrollment:
- Certified Ethical Hacker, Ethical Hacking and Countermeasures
Yes, ed2go courses are completely online. However, keep in mind that not all certifying bodies or industry-specific certifications are recognized internationally. Please review your country's regulations prior to enrolling in courses that prepare for certification.
Yes, you will be prepared for the Certified Ethical Hacker (CEH) Exam # 312-50, offered by EC-Council, and you will receive an exam voucher after successful completion of the course.
This course is open enrollment, so you can register and start the course as soon as you are ready. Access to your course can take 24-48 business hours.
This course is self-paced and open enrollment, so you can start when you want and finish at your own pace. When you register, you'll receive six (6) months to complete the course.
The time allotted for course completion has been calculated based on the number of course hours. However, if you are unable to complete the course, contact your Student Advisor to help you work out a suitable completion date. Please note that an extension fee may be charged.
You may be assigned with an instructor or team of industry experts for one-on-one course interaction. Your support will be available (via email) to answer any questions you may have and to provide feedback on your performance. All of our instructors are successful working professionals in the fields in which they teach. You will be assigned to an Advisor for academic support.
Upon successful completion of the course, you will be awarded a Certificate of Completion.
This course will provide you with the skills you need to obtain an entry-level position in most cases. Potential students should always do research on the job market in their area before registering.
This course is non-credit, so it does not qualify for federal aid, FAFSA and Pell Grant. In some states, vocational rehab or workforce development boards will pay for qualified students to take our courses. Additionally, some students may qualify for financial assistance when they enroll, if they meet certain requirements. Financing is available from select schools. Learn more about financial assistance.
If you have questions that are not answered on our website, representatives are available via LIVE chat. You can also call us at 1-877-221-5151 during regular business hours to have your questions promptly answered. If you are visiting us during non-business hours, please send us a question using the "Contact Us" form.
The Ethical Hacking and Countermeasures course prepares candidates for the CEH exam offered by EC-Council. The course focuses on hacking techniques and technology from an offensive perspective. The advanced security course is regularly updated to reflect latest developments in the domain, including new hacking techniques, exploits, automated programs as well as defensive recommendations as outlined by experts in the field. The CEH body of knowledge represents detailed contributions from security experts, academicians, industry practitioners and the security community at large.
Does it matter if an elite hacker writes a buffer overflow or a script kiddy runs a tool if the target system gets compromised anyway? The point of emphasis here is that the enemy may be intellectually great or small, but he requires just one port of entry to wreck damage while the organization has the entire perimeter to guard with limited time and resources.
EC-Council fulfills its social responsibility by ensuring that only persons with a minimum of two years of security related experience are eligible for the course. In addition, all candidates are required to sign an agreement where they agree to respect the knowledge acquired and not misuse it in any way. The candidate also agrees to abide by all legal laws of the land in the use of thus acquired knowledge. Besides the CEH exam is a tough one to pass as students must have in-depth knowledge to achieve the globally recognized ethical hacking certification.
EC-Council believes in giving back to the security community as it has partaken of it. When you are a Certified Ethical Hacker, you are more than a security auditor or a vulnerability tester or a penetration tester alone. You are exposed to security checklists that will help you audit the organization's information assets, tools which will check for vulnerabilities that can be exploited and above all a methodology to assess the security posture of your organization by doing a penetration test against it. In short, the knowledge you will acquire has practical value to make your work place a more secure and efficient one.
The value of CEH lies in its practical value. Over 20 domains, students are exposed to the business risks involved and the potential damage that can result due to negligence. Candidates are able to make an evaluated opinion regarding the acceptable risk an organization can face should it choose to address a security concern.
The ANSI accredited Ethical Hacking course is primarily targeted at security professionals who want to acquire a well-rounded body of knowledge to have better opportunities in this field. Acquiring a CEH means the candidate has a minimum baseline knowledge of security threats, risks and countermeasures. Organizations can rest assured that they have a candidate who is more than a systems administrator, a security auditor, a hacking tool analyst or a vulnerability tester. The candidate is assured of having both business and technical knowledge.
Consider this. A security defense course educates regarding proper configuration, firewalls, or rather preemptive security. CEH takes the alternative approach - defense in depth by attacking the systems. This is in sharp contrast to courses that teach defensive tactics alone. CEH imparts offensive tactics supplemented with defensive countermeasures. This ensures that the CEH professional can have a holistic security perspective of the organization.
The remuneration per assignment will vary with specifics of the client environment. However, on an average you can expect to be paid around $15,000 to $ 45,000 per assignment.
Congratulations on becoming a CEH. You have joined elite group of professionals around the world. Your next level is to become a Licensed Penetration Tester (LPT).
Hacking techniques represent ways and means by which computer programs can be made to behave in ways they are not meant to. These techniques extend beyond the technology domain and can be applied to test security policies and procedures. Hacking technology is used to refer to those tools and automated programs that can be used by perpetrators against an organization to incur critical damage. As technology advances, the skill required to execute a hack is much lesser as pre-compiled programs are available to effect havoc with simple point and click.